Re: [PATCHES] pgcrypto doc polish

2005-11-02 Thread Tom Lane
Marko Kreen  writes:
> Few small things:
> [ snip ]

Applied, thanks.

I also fixed a few small grammatical problems in the text.

regards, tom lane

---(end of broadcast)---
TIP 1: if posting/reading through Usenet, please send an appropriate
   subscribe-nomail command to [EMAIL PROTECTED] so that your
   message can get through to the mailing list cleanly


[PATCHES] pgcrypto doc polish

2005-11-01 Thread Marko Kreen
Few small things:

- Mention pgcrypto.sql
- Mention asciidoc.  To hint that occasional weird formatting
  is not random.
- Clarify few senctences.
- Remove anything related to MySQL password().  It was
  interesting to look at, but it should not be mentioned in
  serious conversation.  Also, they have replaced it in 4.1
  with SHA1, so the crap implementation is best forgotten.

-- 
marko

Index: contrib/pgcrypto/README.pgcrypto
===
RCS file: /opt/arc/cvs2/pgsql/contrib/pgcrypto/README.pgcrypto,v
retrieving revision 1.13
diff -u -c -r1.13 README.pgcrypto
*** contrib/pgcrypto/README.pgcrypto13 Aug 2005 02:06:20 -  1.13
--- contrib/pgcrypto/README.pgcrypto1 Nov 2005 22:56:42 -
***
*** 3,8 
--- 3,10 
  =
  Marko Kreen 
  
+ // Note: this document is in asciidoc format.
+ 
  
  1.  Installation
  -
***
*** 17,22 
--- 19,31 
  for the module.  They make sure the functions here produce correct
  results.
  
+ Next, to get the function into particular database, run commands in
+ file pgcrypto.sql, which should be installed into shared files directory.
+ 
+ Example using psql:
+ 
+ psql -d DBNAME -f pgcrypto.sql
+ 
  
  2.  Notes
  --
***
*** 248,254 
  crypt-des 3628377 days 19 years
  sha1  5902234 days 12 years
  md5  2345086 1 day  3 years
- password   143781000   25 mins  18 days
  
  
  * The machine used is 1.5GHz Pentium 4.
--- 257,262 
***
*** 256,263 
John the Ripper v1.6.38 `-test` output.
  * MD5 numbers are from mdcrack 1.2.
  * SHA1 numbers are from lcrack-20031130-beta.
- * MySQL password() numbers are from my own tests.
-   (http://grue.l-t.ee/~marko/src/mypass/)
  * `crypt-bf` numbers are taken using simple program that loops
over 1000 8-character passwords.  That way I can show the speed with
different number of rounds.  For reference: `john -test` shows 213
--- 264,269 
***
*** 268,276 
  Note that the "try all combinations" is not a realistic exercise.
  Usually password cracking is done with the help of dictionaries, which
  contain both regular words and various mutations of them.  So, even
! somewhat word-like passwords will be cracked much faster than the above
  numbers suggest, and a 6-character non-word like password may escape
! cracking.  Or may not.
  
  
  5.  PGP encryption
--- 274,282 
  Note that the "try all combinations" is not a realistic exercise.
  Usually password cracking is done with the help of dictionaries, which
  contain both regular words and various mutations of them.  So, even
! somewhat word-like passwords could be cracked much faster than the above
  numbers suggest, and a 6-character non-word like password may escape
! cracking.  Or not.
  
  
  5.  PGP encryption

---(end of broadcast)---
TIP 6: explain analyze is your friend